package/connman: add upstream security fixes for CVE-2021-2667{5, 6}
authorPeter Korsgaard <peter@korsgaard.com>
Mon, 8 Feb 2021 09:39:21 +0000 (10:39 +0100)
committerPeter Korsgaard <peter@korsgaard.com>
Mon, 8 Feb 2021 21:08:00 +0000 (22:08 +0100)
commitcf1dd7e007156f1995c0c1586b66bcdf8bd83655
tree6cb478a5b2781efaf648c9e64e3a94496eef74ac
parent4b8331fd6a35eec6063e698c3b3661fb26f4fc53
package/connman: add upstream security fixes for CVE-2021-2667{5, 6}

Fixes the following security issues:

- CVE-2021-26675: Remote (adjacent network) code execution flaw
- CVE-2021-26676: Remote stack information leak

For details, see the advisory:
https://www.openwall.com/lists/oss-security/2021/02/08/2

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/connman/0001-gdhcp-Avoid-reading-invalid-data-in-dhcp_get_option.patch [new file with mode: 0644]
package/connman/0002-gdhcp-Avoid-leaking-stack-data-via-unitiialized-vari.patch [new file with mode: 0644]
package/connman/0003-dnsproxy-Add-length-checks-to-prevent-buffer-overflo.patch [new file with mode: 0644]